A denial of service flaw was found in the way MySQL processed alternate read requests from two indexes on a table using the HANDLER interface. A remote, authenticated MySQL user could use this flaw to cause mysqld daemon abort. References: [1] http://secunia.com/advisories/41048/ [2] http://dev.mysql.com/doc/refman/5.1/en/news-5-1-49.html Upstream bug report: [3] http://bugs.mysql.com/bug.php?id=54007 Upstream commit: [4] http://lists.mysql.com/commits/110598
Public reproducer from [3]: --disable_warnings DROP TABLE IF EXISTS t1; --enable_warnings CREATE TABLE t1 ( pk INT , PRIMARY KEY (pk)); HANDLER t1 OPEN AS handler_a; HANDLER handler_a READ FIRST; HANDLER handler_a READ `PRIMARY` NEXT; DROP TABLE t1;
This issue did NOT affect the version of the mysql package, as shipped with Red Hat Enterprise Linux 3. This issue affects the versions of the mysql package, as shipped with Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this flaw as having low security impact, as exploitation of this issue would mean only a temporary denial of service, since the mysql daemon shipped with Red Hat Enterprise Linux 4 and 5 will be automatically restarted after the abort. A future update may address this flaw in Red Hat Enterprise Linux 4 and 5. -- This issue affects the versions of the mysql package, as shipped with Fedora release of 12 and 13.
CVE Request: http://www.openwall.com/lists/oss-security/2010/08/30/8
Created mysql tracking bugs for this issue Affects: fedora-all [bug 636780]
The CVE identifier of CVE-2010-3681 has been assigned to this issue.
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2010:0824 https://rhn.redhat.com/errata/RHSA-2010-0824.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2010:0825 https://rhn.redhat.com/errata/RHSA-2010-0825.html
Statement: This issue did not affect the versions of mysql as shipped with Red Hat Enterprise Linux 3. This issue was addressed in Red Hat Enterprise Linux 4, 5 and 6 via RHSA-2010:0824, RHSA-2010:0825 and RHSA-2011:0164 respectively.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0164 https://rhn.redhat.com/errata/RHSA-2011-0164.html